
Defensive Security Podcast Episode 189
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
00:00
- Is It a Configer Exploited House?
This is effectively very similar to confier, or theevulner that configer used. What if all the confier exploited house are really just honey pots set up to get exploited by configer? You don't know. This just raw in the net. But honypots are fun if you're looking for a project. Get it donedon't expose windows. Yu S and b ports to the internut ever, it's a terrible idea. It's da,. i mean, i just can't. I'm consi confiker exploited m s o eight o six seven back on the day. My android phone doesn't fall victim to this. Just say it. Lennox
Transcript
Play full episode